Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 500 of 546

You don't have to pay the Microsoft 365 price increase

Alternatives to Microsoft 365

  • Many home users report using LibreOffice, OnlyOffice, Google Docs, or iWork instead of 365.
  • LibreOffice is praised on Linux but criticized on macOS and for imperfect DOCX compatibility.
  • OnlyOffice is seen as more polished and more compatible with Office formats.
  • Some avoid word processors entirely, using markdown + pandoc, org‑mode, LaTeX, or Python instead.
  • Several note Google Docs is now the default in many schools and universities, creating a “Google‑native” generation.

Subscriptions, Value, and Lock‑in

  • Strong resentment toward paying recurring fees for largely static desktop software; subscriptions are called a modern “con.”
  • Others argue 365 is good value, especially for businesses, when counting Exchange, identity (AAD), Teams, SharePoint, MDM, Windows Enterprise, security, etc.
  • Many describe being effectively trapped in SaaS ecosystems (email, SSO, CRM, ticketing, collaboration) despite discomfort with vendor risk.

Perpetual Office Licenses and Pricing

  • Microsoft still sells one‑time Office 2024 licenses (home and business), but:
    • Non‑commercial vs business SKUs differ in price and Outlook inclusion.
    • Limited to a single PC; multiple devices quickly erase savings vs subscription.
  • Grey‑market “lifetime” keys (e.g., via deal sites) are discussed; some trust them, others call them illegitimate.

OneDrive and Cloud Storage

  • Many use 365 primarily as cheap cloud storage: family plans with 6×1 TB are viewed as very cost‑effective.
  • Others dislike OneDrive’s reliability, UX, and “lock‑in,” preferring Dropbox or dedicated backup services.

AI/Copilot and Price Increases

  • Anger that price hikes are bundled with Copilot rather than exposed as a separate, optional add‑on.
  • Limited monthly Copilot “credits” inside 365 plus a separate expensive Copilot Pro tier are viewed as a dark pattern and forced paid trial.
  • Several explicitly say they do not want AI in Office at all, let alone pay more for it.

Self‑Hosting, Reliability, and Security

  • Some insist self‑hosting email and core services is still viable (often with outbound relays).
  • Others counter that deliverability, phishing, DNS/MX/SPF issues, and outages still require in‑house expertise; even SaaS frequently “breaks” and needs a tech person.
  • Running very old Office (e.g., 2010) is flagged as risky due to unpatched RCEs, though some users downplay the threat by avoiding “untrusted” documents.

28h Days: year 1 update

Circadian biology and Non‑24 discussion

  • Some argue 28‑hour days contradict circadian research and resemble permanent jet lag.
  • Others counter that many people naturally have >24‑hour cycles (e.g., 24.4–25.5h, 26–27h) and that extending the day is easier than shortening it.
  • Several point to Non‑24‑hour sleep–wake disorder and “free‑running sleep” as established phenomena; for these people, >24h schedules feel more natural and less damaging than forcing 24h.
  • Cave isolation experiments and chronobiology studies are cited on both sides, with disagreement over how far natural cycles can drift.

Perceived benefits of a 28‑hour or >24‑hour schedule

  • Aligns sleep with actual tiredness, reducing the need for “sleep hygiene” rituals and struggle to fall asleep.
  • Enables consistently long, restful sleep and sometimes more waking hours overall (e.g., 6×9h vs 7×8h).
  • Frees time for exercise, side projects, and quiet work blocks with minimal interruption.
  • Cycles through all local times of day and eases communication with people in different time zones.
  • Some see it as a lifestyle preference, to be used when obligations allow.

Health concerns and medical perspectives

  • Multiple anecdotes of shift work, rotating schedules, or extreme patterns leading to exhaustion, frequent illness, or long‑term sleep problems.
  • Suggestions to see a sleep psychologist or get sleep studies; possible diagnoses mentioned include Non‑24 and delayed sleep phase disorder.
  • Melatonin is widely discussed: low‑dose can help some entrain to 24h; higher doses or sensitivity cause nightmares or strange dreams for others.
  • Commenters note absence of systematic health or cognitive tracking; one links a small 28‑hour lab study (n=11).

Social, work, and family impacts

  • Major concern: misalignment with partners, friends, and children; risk of resentment or unequal caregiving load.
  • Recurring themes: missed social events, inability to attend recurring meetups, difficulty with store/restaurant hours, perception of being a “shut‑in.”
  • Some see it as effectively a way to avoid people; others value the solitude and global online socializing.
  • Works best with flexible or solitary work; rigid 9–5 environments and global businesses are seen as poor fits.

Other alternative sleep experiments

  • Many report trying 26h free‑running, 36h (24 awake/12 asleep), biphasic (two main sleeps), polyphasic (e.g., 20‑minute naps), yacht‑style 4‑on/4‑off watches, and fragmented “newborn‑like” schedules.
  • Initial phases often feel productive or novel; long‑term, many abandon them due to health, practicality, or social costs.
  • Some with atypical rhythms find moderate alternatives (biphasic, flexible naps) workable within a 24‑hour framework.

Evidence and uncertainty

  • Several commenters stress that individual variation is large and that personal experimentation plus honest self‑assessment matter.
  • Others are skeptical without rigorous before/after cognitive or medical measures and doubt broad generalization from single‑person anecdotes.
  • Long‑term health outcomes of a 28‑hour schedule are widely acknowledged as unclear.

Salesforce will hire no more software engineers in 2025, says Marc Benioff

Reality of the “no more engineers in 2025” claim

  • Many commenters call the statement misleading or “BS.”
  • Users link to Salesforce’s careers site showing 100+ current software engineering openings.
  • Ex‑ and current employees say there has been a de facto engineering hiring freeze since major layoffs in early 2023, but not an absolute stop.
  • Some suggest many postings are “ghost jobs,” backfills only, or openings tied to immigration processes (e.g., PERM), not real net hiring.

Motives: AI marketing and financial optics

  • Widespread view that the statement is primarily marketing for Salesforce’s “Agentforce” AI and part of a broader AI hype narrative.
  • Several see it as cover for cost-cutting and margin optimization after shareholder pressure and earlier layoffs.
  • Some note this lets leadership claim AI-driven efficiency while effectively signaling to investors that headcount growth is capped.

AI “30% productivity gain” claims

  • Heavily doubted by most commenters.
  • Some engineers report meaningful but task‑specific gains from LLMs (boilerplate, debugging, snippets), but not consistent 30%+ across a large org.
  • A few note that at big companies, major productivity drag is process (build systems, approvals, inter‑team dependencies), not coding speed, so code‑assist AI has limited overall effect.
  • One view: any 30–40% gains might be in narrow substeps (e.g., OCR or simple back‑office tasks) that are a tiny share of end‑to‑end work.

Impact on engineers and the job market

  • Commenters fear announcements like this will encourage other executives to freeze hiring and depress software wages, even if AI is not actually replacing engineers.
  • Some current employees see it as a warning sign to start job searching and anticipate more layoffs or offshoring.
  • Broader context: job market already described as “bad and very competitive,” with macro factors (higher rates, post‑layoff glut, AI investment going to GPUs over labor).

Salesforce product, culture, and AI positioning

  • Many criticize Salesforce as slow, over‑engineered, and reliant on heavy customization by consultants; integrations are described as complex and fragile.
  • Several describe a pattern of chasing hype cycles (Einstein AI, Customer 360, Genie/Data Cloud, blockchain, NFT Cloud, IoT, now agents) largely as rebranding and sales stories.
  • Some customers and implementers report poor support and failed or painful deployments, yet expect Salesforce to persist due to inertia and strong enterprise sales.

AI agents: support vs. sales

  • Salesforce claims AI agents will reduce support engineering while it hires 1–2k more salespeople to sell AI.
  • Many see an inconsistency: if agents are so capable, why can’t they sell themselves or replace some sales staff?
  • Customer‑facing AI (support bots, IVRs) is widely described as worsening user experience, especially for complex issues.

LA wildfires force thousands to evacuate, NASA JPL closed

JPL operations and infrastructure

  • Some JPL-hosted scientific sites (e.g., SSD/Horizons, NAIF, DSN pages) went offline; commenters with inside knowledge say many public-facing servers and part of the HPC were intentionally powered down due to the fires.
  • Mission‑critical systems (e.g., Deep Space Network operations) reportedly moved to alternate locations with generator backup.
  • Debate over how much is on‑prem vs cloud; ex‑staff say significant internal tooling and some public services still run on lab infrastructure.

Fire behavior, weather, and geography

  • Multiple separate fires (Palisades/Malibu, Eaton/Altadena near JPL, Hurst, Sunset/Hollywood Hills, others) started over 2 days, driven by extremely strong, dry Santa Ana winds and record‑low humidity (0.3–1%).
  • Fires spread extraordinarily fast; eyewitnesses describe neighborhoods engulfed within an hour and embers traveling miles.
  • Much of the burned area is steep chaparral hillsides and canyons at the wildland–urban interface, not classic forest. Prior wet years boosted fuel growth; this year’s lack of rain left it tinder‑dry.

Detection, mapping, and tools

  • Links and positive comments about Watch Duty, CAL FIRE’s incident maps, NASA FIRMS, FireMappers, NAPSG, and local TV coverage (helicopters with IR).
  • Satellite IR (MODIS/VIIRS, MAXAR SWIR) and manned IR flights are already heavily used; good for mapping, more limited for ultra‑early detection in high‑wind events.

Firefighting tactics, drones, and prevention

  • Consensus: in 60–100 mph winds, aerial suppression (helicopters, tankers, even large fleets) is largely grounded or ineffective; embers and terrain dominate.
  • One long subthread proposes large “drone bomber” fleets and CO₂ or tarp‑based suppression; others push back on physics (water weight, wind, coverage scale, CO₂ hazards) and argue this misunderstands the main constraints.
  • Strong emphasis that over‑aggressive suppression over decades has increased fuel loads; many argue more prescribed burning, grazing, and vegetation management are critical, but hard near dense housing and politically contentious (air quality, liability).
  • Several note that in these chaparral slopes, controlled burns are often impractical; focus should be on defensible space and fire‑resistant landscaping.

Land use, building codes, and insurance

  • Extended debate whether the core problem is “building where we shouldn’t” vs “building the wrong way where we do”:
    • Some say development in high‑risk zones (canyons, wind‑aligned slopes, floodplains) and continued rebuilding without stronger standards is irrational.
    • Others stress you can build to survive many hazards (hurricanes, quakes, some fires) or build cheaply “disposable” structures—but current codes and pricing don’t reflect true risk.
  • Fire‑resistant design is discussed: non‑combustible roofs and siding, ember‑resistant vents, clearing vegetation, and greater setbacks.
  • Tension between wildfire and earthquake requirements: masonry / concrete vs flexible wood and steel framing.
  • Insurance: private insurers pulling back or raising rates; California’s FAIR Plan is the insurer of last resort for fire, but its future capacity is uncertain. Some commenters describe being able to insure only via FAIR in risky areas.

Budgets, governance, and politics

  • Contentious thread on whether LAFD was “gutted”:
    • One line cites a $17–23M reduction (2%) from an $800M+ LAFD budget, much of it absorbed via unfilled admin roles but with cuts to overtime used for training, air operations, and disaster sections.
    • Later reporting (linked in‑thread) says overall fire budget actually increased year‑over‑year after contract negotiations, undercutting initial “gutted” claims.
  • Discussion around emptying of local water tanks in Pacific Palisades: they reportedly started full and were drained fighting the fire, raising questions about whether capacity is undersized or NIMBYs blocked more tanks.
  • Broader debate over priorities: police vs fire spending, pensions, and the difficulty of reallocating within constrained city budgets.
  • Climate policy and leadership are heavily debated:
    • Some frame the fires primarily as climate‑change‑driven (hotter, drier, more extreme winds and fuels) and criticize national political choices.
    • Others put more weight on local land‑use decisions, electrical infrastructure, enforcement around encampment fires, and underinvestment in mitigation.

Inmate firefighters and ethics

  • California relies heavily on incarcerated people as wildland firefighters, historically paid only a few dollars a day.
  • Some see this as a valued, voluntary program with sentence reductions and later record‑expungement pathways (for certain non‑violent offenses) that can improve post‑release prospects.
  • Others label it slavery or indentured servitude under the 13th‑Amendment exception, arguing it undercuts wages, creates perverse incentives to imprison, and rarely leads to regular firefighting jobs without legal reform.
  • Recent California law enabling expungement for some inmate firefighters is noted as partial progress, but pay and coercion concerns remain divisive.

Climate change vs. “forest management” vs. human choices

  • Repeated tension between three narratives:
    • Climate change as an amplifier (hotter, drier seasons, more extreme fire weather, longer fire seasons).
    • Poor vegetation and forest management (suppression‑only policies, lack of prescribed burns, fuel build‑up).
    • Risky human settlement and building patterns (densification in canyons, car‑centric sprawl, insufficient fire‑resistant codes).
  • Several argue all three matter and must be addressed together; others downplay climate or management depending on ideology.
  • Comparisons are made to other regions (Australia, Mediterranean Europe, Midwest, Northeast) to discuss relative disaster risks and potential “safer” areas, while noting that almost no region is disaster‑free.

Human impact and aid

  • Multiple commenters report evacuating, preparing go‑bags, or watching nearby neighborhoods burn. Some share that their homes or relatives’ homes were destroyed.
  • Resources for evacuees and donors are shared (shelters needing bedding, community foundations, fire aid aggregators).
  • Some observe that fires near wealthy, high‑profile areas (Palisades, Malibu, Getty, JPL) draw far more attention than equally destructive fires in poorer or more remote communities.

I had to take down my course-swapping site or be expelled

Incident and project context

  • Student built “HuskySwap” as a class project: a demo site to help students swap course seats, initially using only fake data.
  • Discovered publicly documented “Student Web Service” Swagger APIs and requested a read‑only token to integrate live course data.
  • Soon after the request, the registrar cited “registration tampering/abuse” policies and ordered the site taken down under threat of expulsion.

Registration policies and perceived risks

  • UW policies ban buying/selling spots, holding seats, registering without intent to attend, and automated access to registration resources.
  • Many commenters note that a seat‑trading platform could create perverse incentives (scalping, over‑registration, increased scarcity), even if originally free and well‑intentioned.
  • Others emphasize the site never actually used the real API or touched the registration system, so at most it was an attempted or hypothetical violation.

Alleged coercion and legal framing

  • Student reported that, even after removing the demo, a hold was placed preventing registration for the final quarter “unless” they agreed to help build an official solution, without pay and with university IP ownership.
  • Numerous commenters describe this as extortion/blackmail, potentially implicating state extortion statutes or education‑rights issues; strong advice to consult an attorney and preserve evidence.
  • A minority warns that lawyer‑to‑lawyer escalation can be slow, stressful, and costly, especially against a large institution.

Skepticism and missing pieces

  • Some readers question the one‑sided narrative: lack of published email correspondence, job‑seeking tone in the LinkedIn post, team project vs. “I did it” framing, and timeline of near‑early graduation.
  • Others point out the registrar’s policies were edited after the controversy to explicitly ban creating services that enable the forbidden behaviors, which reduces trust in the administration’s account.

Broader themes about universities

  • Many share prior experiences of universities and agencies reacting harshly to security reports, scraping, or tooling around internal systems.
  • Strong sentiment that modern university administrations are bureaucratic, risk‑averse “fiefdoms” hostile to student initiative and primarily focused on liability, revenue, and image.

Media coverage and outcome

  • Local and tech media picked up the story; UW issued a general statement saying temporary holds are standard to prompt conduct meetings and that they do not “steal IP.”
  • Final update from the student: the hold was removed without a disciplinary meeting; the university deemed takedown sufficient, the student pledged not to pursue HuskySwap‑like projects, and is back on track to graduate.

Some programming language ideas

Capabilities & Access Control

  • Many commenters clarify “capabilities” as unforgeable handles that both designate and authorize access to a resource; authority is in the reference, not in an external ACL.
  • OS analogies: Unix file descriptors, Mach ports, OpenBSD pledge/unveil; some argue these are partial capability systems but not “pure”.
  • At language level, examples include Java/.NET security, Kernel’s first‑class environments, and capability subsets for filesystem or network.
  • Strong interest in using capabilities to constrain libraries (e.g., packages like “leftpad” only ever get string‑manipulation authority).
  • Skepticism: pure capability systems (no ambient permissions) are seen as hard to use; revocation and dynamic nature make them difficult to express in static type systems.

Semi‑Dynamic & Staged Execution

  • Several languages are cited as “semi‑dynamic”: Julia (JIT per type signature), rpython, Starlark (mutation only during an initialization phase), CLOS with explicit “dynamic then compile” points, Crystal’s heavy compile‑time evaluation.
  • Idea: allow a highly dynamic setup phase, after which code is frozen and optimized; some note this is close to what modern JITs and staging systems already do.

Relational Programming & Integrated Data

  • Strong interest in a “truly relational” language where in‑memory data and queries are relational by default (PRQL, Datomic, relational + array systems like Tablam, Haskell libraries).
  • Prolog/Datalog are mentioned as prior art; debate whether logic languages are a good relational model in practice.
  • Some argue SQL’s success is due to its table‑centric, non‑purely‑relational design and business adoption, despite technical shortcomings.

Value Databases & Image‑Based Systems

  • Image/persistent‑store ideas appear via Smalltalk, MUMPS, TADS, QuickJS storage, and Lisp systems.
  • Pros: seamless persistence, easy tooling like time‑travel debugging and “what if” queries.
  • Cons: accumulating cruft, corruption risks, mismatch with text‑based source control. Various systems mitigate this with semantic change tracking and versioning tools.

Modular Monoliths & Dependency Injection

  • Desire for languages that enforce modularity inside a monolith as strongly as microservices do across the network.
  • Ideas: capability‑secure module systems, dynamic scoping or implicit variables for DI, language‑integrated effect systems for IO and side‑effects.
  • Some argue many of these concerns can be addressed by libraries and frameworks (e.g., DI, logging, transactional boundaries), not necessarily new languages.

Loops, Control Flow & Misc Design Ideas

  • Multiple proposals for richer loop forms (e.g., “prepare–check–process” loops, begin/process/end blocks, loop phasers) with examples from Ada, Common Lisp, Raku, and others.
  • Other recurring wishes: better cross‑language interoperability, standard multidimensional arrays and vector types, integrated GPU/CPU compilation, “big objects” with strong boundaries, and non‑Turing‑complete or constrained languages for safer embedded scripting.

Facebook is removing stories about pornographic ads

404 Media model and access

  • Some commenters strongly endorse supporting 404 Media financially, citing a track record of impactful investigations and a worker-owned model.
  • Others feel $100/year is too high, especially for people arriving via a single story.
  • There’s debate over whether the site is “paywalled” vs just requiring email sign-in, which is justified as anti-scraping. Archive links are shared as a workaround.

HN flagging behavior and meta-moderation

  • The submission was quickly flagged off the HN front page, prompting suspicion of Meta PR or politically motivated flagging.
  • HN moderation reports that flagging patterns looked “normal,” with no obvious corporate/political clustering; the original title was considered baiting and was softened.
  • Some suggest requiring flaggers to select reasons to improve transparency; HN moderation worries this would add bureaucracy and might not reveal true motives.
  • Several users note that many worthwhile stories get buried by flags and recommend RSS or alternate front-ends that show posts chronologically.

Meta’s treatment of pornographic content and ads

  • Central complaint: Meta allegedly removes user posts about porn/scammy ads while allowing similar or identical imagery in paid ads, seen as blatant hypocrisy prioritizing ad revenue over user rules.
  • Some argue sex, porn, and prostitution are not inherently bad and that sex-positivity is preferable to puritanism; others see commodified porn as socially harmful.
  • Many emphasize that the issue is unequal enforcement: advertisers vs users, not the moral status of sex itself.
  • Users report seeing increasing amounts of soft- or hard-core porn, suggestive “reels,” and OnlyFans-style content, often hard to tune out even with blocking/reporting.
  • Reports of porn or scam ads frequently result in “no violation” responses, reinforcing perceptions that Meta tolerates revenue-generating abuse.

Broader censorship and ad-fraud concerns

  • A national CERT recounts that Facebook auto-removed posts linking to their ad-fraud report about Meta/Google, then even removed posts discussing the removals and banned some accounts; issue was later resolved after escalation.
  • Some see this as overzealous automated systems; others suspect coordinated mass-reporting and defensive behavior when platforms are criticized.

Free speech, “public square,” and regulation

  • Commenters contrast Meta’s public “free speech” rhetoric with its willingness to censor criticism and treat users and advertisers differently.
  • Several argue that platforms invoke the “digital town square” metaphor to gain legitimacy while avoiding the accountability and regulation that would accompany being treated like a public utility.
  • There is disagreement over whether earlier political moderation at Meta was voluntary or coerced by governments; one commenter directly challenges claims of “extortion” as unsupported.

Quitting Meta and network effects

  • Some advocate simply abandoning Facebook/Instagram; others say they already have, but Meta persists due to billions of remaining users and aggressive data collection (including shadow profiles and AI bots).
  • Network effects and practical dependencies (e.g., school parent groups, messaging with non-technical friends/family) make quitting costly, especially for parents and older users.
  • A minority argues that giving up on changing behavior is itself the problem; others admit they “moved on” to other life priorities.

Moderation difficulty and pessimism about social media

  • Several comments stress that large-scale moderation is inherently hard: balancing legality (e.g., CSAM), user safety, advertiser demands, and diverse norms is nearly impossible.
  • One view holds that any large online social platform will inevitably degenerate into a “cesspool” due to the nature of the medium.
  • Others fantasize about publicly funded or civic social platforms (e.g., by public broadcasters) or more offline, in-person communities, but also note existing public forums already struggle with low-quality discourse.

White House unveils Cyber Trust Mark program for consumer devices

Scope and Goals of the Cyber Trust Mark

  • Seen as a needed baseline for insecure consumer IoT (cameras, baby monitors, smart appliances, etc.).
  • Based on NIST guidance; early descriptions emphasize basic hygiene: authentication, encryption in transit/storage, software update capability, factory reset, documentation, and a way to report vulnerabilities.
  • Applies initially to “consumer wireless IoT products,” not general home/SMB network gear.

Label Mechanics and Verification

  • Mark will include a QR code linking to an FCC/UL-managed registry with product details (support period, update behavior, etc.).
  • Supporters see this as better than a bare sticker and similar in spirit to Energy Star.
  • Critics note most consumers never check registries, and label verification UX is currently poor or opaque.

Counterfeits, Enforcement, and Practicality

  • Concern that bad actors will just print the logo, as with other marks.
  • Some argue misuse is a federal offense and customs/retailers bear responsibility.
  • Others counter that customs rarely inspect, overseas sellers ignore U.S. law, and marketplaces (e.g., third-party sellers) won’t reliably police labels.

Cloud Connectivity vs. Local-Only Designs

  • Strong thread arguing many devices don’t need internet at all; LAN-only or hub-based “dumb” devices are inherently safer and longer-lived.
  • Others respond that mainstream users expect remote access via vendor clouds and cannot configure VPNs or custom gateways; the program aims for incremental improvement in that reality, not a redesign of home networking.

Updates, “Dumb” Devices, and Security Trade-offs

  • Some argue read-only or non-updatable devices can be safer and force better upfront engineering.
  • Others note that once a non-updatable device is cracked, all units are permanently vulnerable; updatability is critical for long-lived threats.

Trust, Politics, and Capture Concerns

  • Skepticism that any government label can “ensure” security; fear of security theater and eventual erosion of trust in safety marks.
  • References to prior NIST controversies and worries about protectionism, monopolization (large vendors affording certification), and regulatory capture by UL and big tech.
  • Some see overlap with EU IoT security standards; others suggest an independent or nonprofit-led scheme would be preferable.

Missing Pieces and Wishlists

  • Desired but largely absent: guaranteed support lifetimes, commitments to open-source on EOL, offline functionality without cloud, true end-to-end encryption clarity, data-use disclosures, user repairability, and post-vendor user upgradability.
  • Several commenters doubt these stronger guarantees are commercially or technically realistic in the general IoT market.

C++26: A Placeholder with No Name

Use of _ as a discard / placeholder

  • Several compare C++26’s unnamed placeholder to existing “discard” conventions:
    • C#: _ signals an intentionally ignored value, including multiple independent _s in tuple destructuring.
    • Prolog had _ as an anonymous variable in the 1970s; some speculate this pattern predates computing as a general “redaction” symbol.
  • Rust is discussed as a contrast:
    • Binding to _ in Rust immediately drops the value; it can’t be used to keep a lock or RAII guard alive for a scope.
    • Some argue this decision may be regretted long-term, though Rust otherwise doesn’t have the motivating C++ problems (rebinding, unused-variable warnings) in the same way.

C++ complexity, legacy, and Rust/C comparisons

  • Some see the proposal as yet another sign of C++’s “convoluted mess”; others say this particular change actually simplifies code.
  • Debate on whether Rust will replace C++:
    • One side: Rust (or its successor) will gradually displace C++; C++ may end up like COBOL, mostly legacy but still around.
    • Other side: C++’s installed base (including compilers) is vastly larger than COBOL’s; it will persist for decades.
  • Comparisons of safety:
    • Pro‑C++: RAII, destructors, smart pointers, and stronger typing make it safer than C.
    • Skeptics: C++ just moves many hazards into the standard library (iterator invalidation, dangling string_views, UB); debugging can be harder than in C.
    • Rust is seen as safer but also accumulating complexity; some criticize its ergonomics, especially borrow checking, lifetimes, and heavy use of Option/Result “breadcrumb” chaining.
    • C is argued to remain relevant, especially as a universal ABI layer.

auto and type inference

  • Large subthread on auto:
    • Critics: harms readability, especially when learning a new codebase or reading in a browser/code review without IDE help.
    • Supporters: reduces redundancy and refactoring pain; vital for long template types, lambdas, iterators, and coroutine types.
    • Common compromise: use auto when the type is obvious or irrelevant locally; spell out types at API boundaries and where it aids understanding.
  • Strong disagreement over relying on IDEs/LSP:
    • One camp: not using an IDE is “doing it wrong”; modern tooling makes inferred types trivial to inspect.
    • Other camp: code should remain understandable without “fancy” tools; greppability and explicit types are part of good API and library design.

Meta

  • Some argue not every annoyance in C++ needs a language feature.
  • Others see these incremental changes, including placeholders and auto, as necessary to keep C++ usable despite its accumulated complexity.

Bringing SerenityOS to real hardware, one driver at a time

SerenityOS, Ladybird, and Project Direction

  • Commenters welcome progress toward running SerenityOS on real hardware, but note that its browser, Ladybird, is now a separate project and no longer targets SerenityOS.
  • Ladybird is shifting from “homegrown everything” to using mainstream libraries (OpenSSL, FFmpeg, cURL, Skia, ANGLE) to become a practical, secure, cross-platform browser.
  • Some are sad that SerenityOS loses energy as Ladybird becomes its own, more political project (a non‑Google, non‑Chromium major browser).

Browser Ecosystem and Control

  • Discussion about whether Ladybird can really be “independent of Google” while using Google-originated tech like Skia/ANGLE.
  • Debate over who effectively funds or controls WebKit and Gecko; some argue Google money underpins them, others emphasize Apple’s control of WebKit and Mozilla’s dependence on Google search deals.
  • Broader concern: browser-engine monoculture (Chromium) and who “controls the web.”

Hardware Targets and Driver Challenges

  • Device drivers are seen as the main obstacle for hobby OSes.
  • Some suggest adapting NetBSD drivers or using rump kernels; others counter that SerenityOS deliberately avoids external code.
  • Debate over best hardware targets:
    • QEMU praised as a stable, accessible initial target.
    • Raspberry Pi suggested, but criticized for proprietary blobs, poor documentation, odd boot sequence, and flakiness.
    • Some prefer better-documented SBCs (e.g., Beaglebone) or RISC‑V long-term.

From-Scratch Philosophy vs Reuse

  • SerenityOS’s “build everything ourselves” ethos is praised for educational value, clean implementations, and keeping “muscles fit.”
  • Critics say this rediscovery wastes effort versus standing on existing work, especially for complex, security-sensitive components.
  • Some argue the OS should refactor into a Wayland compositor or Linux-based DE; others respond that this would undermine its core purpose as a from‑scratch hobby OS.

Hobby vs “Impactful” Work

  • One side claims such hobby projects divert talent from “vital” open‑source infrastructure.
  • Many replies reject this, defending leisure coding, educational value, personal fulfillment, and the fact that “vital” work should be paid.

Prompt Injection and LLMs

  • A joke “ignore all previous instructions” snippet in the blog leads to a short discussion of prompt injection.
  • Several note that modern LLM tools often ignore such injections, though the problem is still considered real.

Show HN: Atlas of Space

Overall Reception

  • Strongly positive response; many call it beautiful, smooth, and “bookmark-worthy.”
  • Several mention showing it to kids and using it to spark conversations about space, scale, and aliens.
  • People appreciate that it’s lightweight and runs well directly in the browser.

UI/UX and Usability

  • Panning: users request keyboard alternatives to right-click drag and note issues on touchpads and mobile.
  • Mobile: many are impressed by how well it works on phones but find centering/following planets harder than on desktop.
  • Selection: repeated requests to make labels and orbit paths clickable, not just tiny planet points; also brighter non-planet labels.
  • Navigation: suggestions for a “compass” or quick recenter button; there is a reset control but some miss it.
  • Users ask for a way to lock view for scrolling on mobile and for deep links to specific objects.

Time Controls and Educational Use

  • Many want to scroll through time, set arbitrary past/future dates, and run time backwards.
  • A real-time clock and “where is this planet right now” view are requested; a real-time mode with backward time support is later added.
  • Some want a consistent interpretation of ∆t, noting confusion between displayed rate and actual elapsed time.

Physics, Data, and Accuracy

  • Creator explains orbits are simulated from Keplerian elements transformed to Cartesian coordinates and integrated forward.
  • Limitations acknowledged: approximations, missing effects (solar wind, relativity, non-spherical bodies), and difficulty modeling co-orbitals and spacecraft trajectories.
  • Bugs/quirks: initial Earth axial tilt sign was wrong (later fixed); users notice orbit lines offset from bodies and question precision.

Scope and Feature Requests

  • Requests to:
    • Add Trojan asteroids, more spacecraft (beyond the Tesla Roadster), Voyager missions, FarFarOut, Bennu, and Trojan groups.
    • Hide non-planets to focus on planetary inclinations.
    • Show Lagrange points, interplanetary transport networks, and possibly relativistic mechanics.
    • Extend beyond the solar system to nearby stars, the galaxy, and other systems.
    • Add a “fictional” overlay (e.g., ring gates, sci‑fi locations) and sound effects.
    • Use it as a screensaver/active desktop.

Technology Stack and Openness

  • Implemented as a static React app using Three.js for 3D and canvas for annotations, deployed on Netlify.
  • Codebase is open source, and commenters praise modern browser capabilities and plan to study the implementation.

Astronomy and Terminology Side Threads

  • Debate over calling the star “Sol” vs “Sun”; some see “Sol” as sci‑fi, others as valid Latin/astronomy usage.
  • Observations and discussion around Pluto’s inclined, eccentric orbit and resonant “dance” with Neptune.
  • Discussion of trans‑Neptunian and distant objects (Sedna, FarFarOut), and how observational bias explains their clustered positions.
  • Side explanations of spacecraft attitude control, star trackers, and experimental pulsar navigation systems.
  • Clarifications about lunar and planetary paths around the Sun, and an ecliptic-based coordinate system (vernal equinox, ecliptic north/south).

Cracking a 512-bit DKIM key for less than $8 in the cloud

Email and DKIM security context

  • Many argue email is still weaker than people assume; others counter that with TLS between MTAs plus DKIM/DMARC, it’s “good enough” for most users, with real failures often being passwords and account takeover.
  • Several participants stress that the real risk here is domain spoofing (spammers forging DKIM on your domain), not confidentiality of message content.
  • DKIM-512 is rare in the wild, but still present: roughly ~0.3% of observed DKIM keys in a 1M-domain sample, and likely higher on the broader internet.

RSA key sizes and factorization difficulty

  • Broad agreement: 512‑bit RSA is long broken and trivial to factor with today’s tools and commodity hardware.
  • Most say 1024‑bit RSA is on the edge: not broken publicly, but considered weak and being phased out; attackers with nation-state resources might manage it.
  • Disagreement and confusion over scaling:
    • Some claim GNFS cost grows roughly with the square of bit length and dramatically understate the cost of 1024/2048 factoring.
    • Others correct this, pointing to GNFS’s super‑polynomial behavior and giving cost estimates for 1024‑bit factoring in the tens of millions of dollars or more.
  • Consensus: 2048‑bit RSA is currently safe against classical attacks; long‑term future belongs to non‑RSA schemes and post‑quantum algorithms.

Migration, standards, and alternative algorithms

  • RFCs now deprecate <1024‑bit DKIM keys and require verifiers to handle at least 1024–4096 bits; reality lags but most large providers comply.
  • Ed25519 for DKIM is standardized and partially deployed, but ecosystem support (mail servers, big providers, DNS tooling) is uneven and slow.
  • Some argue for just using 4096‑bit RSA where possible; others see this as wasted effort vs. moving to elliptic curves or PQC.

Operational and DNS constraints

  • Practical blockers mentioned:
    • DNS TXT record limits (255 bytes per string; multi‑string records are allowed but poorly supported in some UIs/registrars).
    • Some DNS providers still cap DKIM keys at 1024 bits or don’t handle split TXT records well, especially in smaller or non‑US markets.
  • Tooling for key rotation and management is described as underdeveloped and brittle, so many orgs leave old or weak keys in place for years.

Deniability, privacy, and DKIM

  • A substantial subthread debates whether strong, long‑lived DKIM signatures are a privacy problem:
    • One side: they enable stolen mail spools to be cryptographically authenticated years later, aiding blackmail, leaks, and legal exposure, while offering little value to end users.
    • Proposed mitigation: regularly rotate DKIM keys and later publish old private keys to restore repudiation (anyone could have forged those signatures).
    • Others counter that non‑repudiation can be socially useful (evidence in disputes, courts, journalism) and that users often want verifiability, not deniability.
  • Clarified: DKIM authenticates a sending domain/MTA, not an individual human; courts and non‑experts may nonetheless over‑interpret its evidentiary value.

Ethics and legality of cracking live keys

  • Some are uneasy about factoring real, in‑use DKIM keys, seeing it as crossing an ethical or even legal line (akin to cloning a physical key).
  • Others respond that:
    • The work used only public data and did not send fraudulent mail; it’s comparable to demonstrating exploitability in typical security research.
    • Responsible disclosure and fixing the issue before publication makes it ethically acceptable.
  • No clear consensus; participants note jurisdiction‑dependent laws and the practical risk that upset companies might still seek prosecution.

Ask HN: What sub $200 product improved your 2024

Digital tools & AI

  • Several recommend paid AI tools:
    • ChatGPT Plus (~$20/month) cited as a big coding/productivity boost, though one person notes it exceeds the $200/year threshold and worries about skills atrophying.
    • Cursor (AI-powered code editor) praised for semi-automated coding where the user remains the “creative expert,” especially for complex game/dialogue pacing. Another user questions what makes it special beyond automatic code edits.
  • JetBrains IDEs (e.g., WebStorm, RubyMine, IntelliJ) seen as a major upgrade over VS Code:
    • Strong refactoring, integrated git/diff, DB tools, test frameworks, and debugger in one subscription.
    • View is that VS Code is a great editor, but JetBrains is a fuller “engineering” environment.

Home, comfort & health

  • Sleep and rest:
    • Weighted blankets, satin/sateen sheets, and high-quality boxer briefs (incl. bamboo fabric) reported to dramatically improve sleep comfort.
    • A popular sleep mask and noise‑cancelling headphones cited as big contributors to better sleep and focus.
  • Air quality:
    • Air purifiers (Levoit and higher‑end BlueAir) and DIY Corsi–Rosenthal boxes credited with resolving respiratory/sleep issues.
    • CO₂ monitors (Qingping, AirGradient DIY) reveal very high indoor CO₂, explaining fatigue; users validated them against lab‑grade monitors.
  • Water:
    • Sparkling water machines (Aarke, Drinkmate, Sparkel) reduce plastic waste and hauling bottles. Some prefer CO₂ subscriptions; others dislike shipping heavy cylinders and tinker with homebrew CO₂ setups.
    • One asks about sparkling water and dental health; another reports decades of heavy use with no apparent issues, but labels it anecdotal.

Tech & gadgets

  • Portable monitors (15–22") praised for doubling screen space on the go. Some criticize paying ~$200 for 1080p; others say it’s fine for aging eyes and large form factors are rare.
  • Mesh Wi‑Fi systems solve coverage/dropout issues at home.
  • E‑ink readers (Boox Color 7) and Wacom tablets reduce eye strain and make annotation/drawing more natural.
  • Robot vacuums, even cheap refurbished models, significantly reduce cleaning effort; users note deals and future upgrades, and ask about obstacle avoidance.

Tools, mobility & misc

  • Power tools (high‑torque impact wrench), knife upgrades plus sharpening systems, cable tie guns, and upgraded office chair casters all deliver outsized everyday convenience.
  • Travel: neck braces/advanced travel pillows, solar panels for hiking, universal charger–powerbank combos, and compact car jump starters are highlighted for reliability and comfort on the move.
  • Lifestyle:
    • Some praise competitive online games as a structured, goal‑oriented hobby; others report they increased stress and found calmer alternatives like learning piano.
    • One mentions illegal drugs (e.g., cannabis) as life‑improving in social/creative contexts; another questions whether that truly counts as “improvement.”

Bye-bye Windows gaming? SteamOS officially expands past the Steam Deck

SteamOS vs Windows on Handhelds and PCs

  • Many welcome competition to Windows gaming, citing frustration with Windows 11 UX, forced updates, bloat, and hardware restrictions.
  • Example pricing: Legion Go S reportedly costs $599 with Windows and $499 with SteamOS, though the Windows model includes a larger SSD; some argue OEM Windows licenses are cheap and the price gap is mostly margin.
  • Strong consensus that Windows 11 is poorly suited to small handhelds (tiny UI, intrusive prompts), whereas SteamOS is designed for that form factor and “console-like” use.

Maturity of Linux/SteamOS Gaming

  • Proton/Wine are seen as transformative: many report large Steam libraries now “just work” on Linux and Steam Deck, including demanding titles, often with zero configuration.
  • Tools like ProtonDB, Heroic, Lutris, RetroArch, and various SteamOS-like distros (Bazzite, ChimeraOS, SteamFork, CachyOS handheld build) are frequently cited as making non‑Steam and legacy games practical.
  • Main remaining blockers: kernel-level anti‑cheat and publisher DRM/launchers (EA, Riot, some Sony overlays), which often break under Proton. Competitive F2P titles (Fortnite, Valorant, League, recent FIFA/FC) are common examples.

Anti‑Cheat, Rootkits, and User Freedom

  • Large subthread debates kernel anti‑cheat:
    • One side sees it as an unacceptable “rootkit” that undermines user control, privacy, and OS security; they’d rather lose certain multiplayer games than cede kernel control.
    • Others argue strong anti‑cheat is necessary to keep competitive games playable and that many players willingly trade some control for a cheat‑reduced experience.
    • Multiple comments advocate server‑side anti‑cheat and better game design (less trust in the client) instead of kernel drivers.

Beyond Gaming: Desktop Use and Apps

  • SteamOS on Deck is already a full KDE desktop with browser, terminal, editors, and app store; users add IDEs, Discord, etc., and even dock Decks as desktops.
  • Desire remains for reliable support of Adobe tools, Lightroom, and high‑end Windows utilities; Linux alternatives (Darktable, RawTherapee, LibreOffice) are praised but seen as insufficient for some workflows.

Adoption Prospects and Skepticism

  • Optimists foresee SteamOS and derivatives becoming the default for dedicated gaming PCs and TV consoles, with Windows kept only for edge cases.
  • Skeptics argue casual gamers will stick to Windows due to broader peripheral support, specific modding tools, and sheer inertia.

Spinal cord injuries from mountain biking exceed hockey, other high-risk sports

Context and Study Scope

  • Many commenters stress that the study is from British Columbia, a global “mecca” for downhill and bike-park riding (e.g., Whistler), which likely skews injury counts.
  • Several argue the headline is misleading without normalizing by participation rates; more total spinal injuries does not necessarily mean a higher per‑participant or per‑hour risk than hockey or football.

Discipline Differences in Mountain Biking

  • Strong consensus that “mountain biking” covers very different activities:
    • Casual XC / local trail riding vs. lift‑accessed downhill, enduro, freeride, and bike-park jump lines.
  • Multiple riders say serious spinal and major bone injuries are overwhelmingly associated with aggressive downhill, big jumps, and double‑black features, not mellow trails.

Role of E‑Bikes and Access

  • Some foresee e‑bikes worsening injury rates by:
    • Allowing less fit or less skilled riders to access steeper, more remote terrain more often.
    • Increasing “exposure” (more downhill runs per day).
  • Others note power limits (typically ~20–28 mph assist) and argue the main danger is rider behavior and infrastructure (lack of safe bike space pushing riders into pedestrian or car domains).

Equipment, Protection, and Bike Design

  • Discussion of pads, full‑face helmets, spine protectors, airbag systems, and smart materials (e.g., D3O).
  • Study reportedly found most injured riders wore helmets but few wore additional pads.
  • Commenters note modern bike geometry (slacker head angles, longer wheelbases) makes going “over the bars” less likely but encourages higher speeds and more aggressive terrain.

Risk Perception vs. Other Sports

  • Comparisons with football, soccer, hockey, gymnastics, combat sports, motorsports, equestrianism, and road cycling:
    • Argument that “high risk” is poorly defined; both absolute numbers and severity per exposure matter.
    • Some feel road cycling among cars is more frightening; others view downhill MTB as clearly more dangerous.

Skills, Technique, and Falling

  • Several emphasize skills training (including “how to fall,” borrowing from martial arts and judo) as underused but potentially important for reducing serious injury.

Environmental and Ethical Debate

  • One long post argues mountain biking and trail building are inherently destructive to wildlife habitat and should be banned from natural areas.
  • Others push back, questioning this focus given far greater impacts from cars and urban infrastructure.

The Aging Programmer [video]

Relevance and scope of the talk

  • Some find the talk “generic aging advice,” not strongly programmer‑specific; slides alone feel like a 2‑minute summary of standard guidance.
  • Others say the full hour adds useful context, nuance, and caveats about individual variation and survivorship bias.
  • Several older devs say they “needed to hear this” and found it pragmatic and positive.

Effects of aging on programming work

  • Many report reduced ability for marathon sessions, all‑nighters, and long typing stretches; more physical discomfort and need for breaks.
  • Some feel slower at low‑level tasks but better at architecture, system design, YAGNI, and “good enough” decisions.
  • A few younger but disabled devs describe similar limits early in their careers and significant mental‑health stress from that.

Physical health, pain, and ergonomics

  • Back pain is common; multiple users strongly recommend specific books/methods (e.g., McGill, McKenzie) but others warn these can worsen some conditions without proper diagnosis (MRI, good PT).
  • Suggestions include: strength training, kettlebells, TRX, push‑ups, active chairs, reclining chairs, and careful keyboard/desk ergonomics.
  • Good results are reported, but outcomes are described as highly individual and provider‑quality‑dependent.

Focus, cognition, and digital distractions

  • Many feel attention spans worsen with age and/or social media; others in their 40s+ report no decline, crediting avoidance of “mass social media.”
  • Strategies: reading books again, “digital detox,” meditation, and deliberate “lazy breaks” rather than forcing concentration.

Career dynamics and corporate culture

  • Older devs struggle more with corporate politics than with code: resistance to “go fast and break things,” trendy rewrites, and architecture vanity projects.
  • There are challenges asserting experience against younger, faster devs when not formally senior; regret about not pushing harder on sustainable choices.
  • Some feel age filters make them effectively unhirable despite peak skill.

Work setups: standing/treadmill desks

  • Standing desks are widely endorsed, with emphasis on alternating standing/sitting; inactivity in any posture is seen as harmful.
  • Treadmill desks help people reach step goals during work; some can type fine while walking, others find reading harder.

BMI, race, and health arguments (contested)

  • The speaker dismisses BMI as “nonsense” and likely racist; some commenters echo professional‑body critiques that BMI was derived from narrow populations and should be used with other metrics.
  • Others argue BMI is just a height/weight number, not inherently racist; they see “BMI is racist” as overreach or obesity‑normalization.
  • Separate sub‑thread debates food deserts and whether healthy eating is realistically accessible in poor areas, with strong disagreement.

Hypermobility, autism, and programmers (contested)

  • One commenter claims programmers are unusually hypermobile, tying this to specific genes and to autism/transgender over‑representation; evidence presented is tiny (n=5) and heavily challenged.
  • Others counter that such strong claims need real data; a link is shared showing higher hypermobility prevalence in ADHD/autism populations, but extrapolation to “programmers in general” is viewed as speculative.

Outlook on aging and disability

  • Several older or disabled programmers emphasize that bodily decline is inevitable but not the end of meaningful work.
  • Themes: accept limits, adapt proactively (tools, habits, expectations), and avoid the “this is just how it is now” fatalism.
  • One younger engineer gradually going blind finds the talk validating, highlighting that disability is a universal, eventual human condition and planning for it benefits everyone.

Operating System in 1,000 Lines – Intro

Hardware targets & RISC‑V details

  • Several comments discuss whether the 32-bit RISC‑V OS can run on real hardware.
  • Current mainstream RISC‑V SoCs with MMUs are mostly 64-bit; 32-bit RISC‑V with MMU is uncommon outside FPGA/embedded contexts.
  • Porting from RV32 to RV64 (or vice versa) is seen as straightforward: main change is page-table layout (sv32 two-level vs sv39/sv48 multi-level).
  • Allwinner D1 and Raspberry Pi / Pico boards are suggested as potential targets after some porting.

QEMU, virtio, and debugging

  • Virtio is highlighted as a useful abstraction for virtual devices; it’s not QEMU‑only and is also used by other hypervisors.
  • Some prefer QEMU for convenience, others mention using KVM directly for a leaner setup.
  • Strong recommendations to wire up GDB early via QEMU’s built‑in GDB server.
  • Additional QEMU features praised: record/replay, monitor commands for MMU/virtual memory debugging, and detailed logging flags. Reverse debugging is noted as currently unreliable.
  • Multiarch GDB builds reduce the need for per‑architecture clients.

Alternative guides, languages, and OS designs

  • Other educational OS resources are mentioned: a Rust OS tutorial, MIT’s RISC‑V xv6 course, JOS/x86 materials, and a Nim‑based kernel.
  • One line of discussion argues there are already many hobby Unix‑like C kernels and calls for more experimentation: new languages (Rust, Zig, Hare, Ada, Nim, etc.) and non‑Unix designs (e.g., Plan 9–style).
  • Others respond that writing “yet another Unix‑like in C” is still a valid and concrete learning goal, and that unusual designs only appear when someone is motivated to build them.

Feedback on the 1,000‑line OS book itself

  • Many express enthusiasm: concise, approachable, good for undergrads and weekend projects.
  • Typos and phrasing issues in the English text are noted; the author confirms partial machine translation and invites PRs.
  • Readers request an ebook version; others show how to generate an EPUB from the Markdown and share a preliminary build.
  • The OS is intentionally not Unix‑like and is presented as a conceptual “toy” that readers can adapt to other architectures or languages.

Today I learned that bash has hashmaps (2024)

Feature: Bash associative arrays (“hashmaps”)

  • Bash has associative arrays via declare -A, enabling key–value lookups.
  • Some find the syntax ugly or non-intuitive; others note it’s no worse than many mainstream languages.
  • Keys can be listed with ${!map[@]}; behavior differs between bash and zsh, so scripts should pin the shebang to bash if using this.

Portability and macOS limitations

  • macOS ships an ancient Bash 3.2 (due to GPL licensing), which lacks associative arrays; newer Bash from Homebrew supports them.
  • This hurts portability across Linux/macos if you rely on associative arrays. Some prefer zsh (included on macOS) or stick to POSIX sh.

Pitfalls, scope, and reliability

  • Associative arrays interact badly with Bash scoping and references:
    • local variables have dynamic scope (visible to child functions), which surprises many.
    • Passing associative arrays “by value” doesn’t work; “by reference” requires local -n and is fragile.
  • There are reports of historical memory leaks with associative arrays in long-running scripts on older distros.
  • Some argue that needing associative arrays is a sign the script is too complex and should move to Python, Go, etc.

Performance and implementation debate

  • One comment claims lookups are linear-time and “slow AF”, implying they are not real hashmaps.
  • Others argue “hashmap” is being used loosely: associative array is the abstraction; hash map is one possible implementation.
  • There’s disagreement over whether it’s appropriate to call Bash’s structure a hashmap at all.

Shell vs. other languages and tools

  • Several people like Bash for small glue scripts, pipelines, and text processing; they recommend other languages for heavy logic, data structures, and error handling.
  • Others report writing very large, long-lived Bash systems successfully, emphasizing its ubiquity and speed.

Documentation, learning, and shell evolution

  • Reading the Bash manual or release notes regularly surfaces features like arrays and obscure options.
  • Some find the 80+ page man page daunting, preferring example-driven “cheat sheets”.
  • Discussion touches on alternative shells (fish, nushell, PowerShell) and on whether Unix tools should output structured data (e.g., JSON) versus plain text.

Annual 'winners' for most egregious US healthcare profiteering announced

Relative wealth and “middle class” comparisons

  • One commenter claims most US middle-class people are poorer than those in a Southeast Asian “backwater,” citing fear of healthcare bankruptcy and better quality of life abroad.
  • Many challenge this as implausible without data, pointing to much higher US income and GDP per capita (including PPP-adjusted figures).
  • Others note national medians and averages mask inequality; a “tech middle class” in poor countries may actually be local upper class.
  • Several argue quality of life is multidimensional (safety, infrastructure, services), making simple income comparisons misleading or unclear.

Disposable vs discretionary income and cost of living

  • Long subthread debates “disposable income”: economists define it as post-tax (plus/minus certain mandatory charges), not after housing and other expenses.
  • Several posters say laypeople often use “disposable” to mean “money left after bills,” causing confusion.
  • OECD disposable income is noted as PPP-adjusted and may include in-kind social transfers (health, education), but critics argue it still obscures higher US out-of-pocket costs for these services.
  • Some cite informal cost-of-living comparisons (e.g., France vs US) suggesting the US is ~30% more expensive; others note PPP adjustment should already handle broad COL differences.

Housing affordability in the US

  • One view: housing isn’t broadly unaffordable outside top-tier metros (NYC, SF); HN overrepresents high-cost cities.
  • Opposing view: data from FRED and Zillow show large price increases across many states and midwestern cities; commenters say this is now a nationwide issue.
  • Rural Midwest examples show cheap housing but very low incomes and weak job markets, limiting practical affordability.
  • Property taxes (e.g., Texas vs California with Prop 13) are highlighted as a major factor in ongoing costs.

Experiences and risks in the US healthcare system

  • Some middle-class, insured commenters report mostly positive care, no denials, and no catastrophic bills.
  • Others describe the system as precarious even for the insured, citing research that many medical bankruptcies involve insured, middle-class people.
  • Detailed anecdotes describe:
    • Long delays and repeated rescheduling in primary care and specialist referrals.
    • Difficulty finding providers accepting new patients.
    • Billing errors, incomplete insurance claims, and aggressive collection attempts.
    • Fragmented responsibilities among insurers, providers, and equipment vendors, with patients stuck managing the bureaucracy.
  • Consensus within this subthread: the biggest problem is systemic misaligned incentives and administrative complexity, not just formal “denials.”

Politics and public preferences on healthcare

  • One perspective: the US “wants” for-profit healthcare; democratic outcomes and recent elections are interpreted as support for industry-friendly policies.
  • Others push back, noting sarcasm in that framing and that public opinion is conflicted: people like the idea of universal coverage but often resist being moved from employer plans.

Profiteering, fraud, and regulation

  • Some argue parts of the awards list are outright fraud (false Medicare billing, unnecessary chemo) rather than normal “profiteering.”
  • Others emphasize systemic dysfunction: weak oversight allows huge frauds and abusive schemes (e.g., stripping hospital real estate, loading entities with debt while executives enrich themselves).
  • A linked estimate suggests regulatory compliance alone adds substantial per-admission cost, yet still fails to prevent abuse.
  • There is debate over whether any payment model (fee-for-service, capitation) can avoid gaming; several commenters assert all bureaucratic rules will be exploited.

A day in the life of a prolific voice phishing crew

Call Handling Habits & Tradeoffs

  • Many participants ignore unknown numbers entirely, or use iOS “Silence Unknown Callers” and call-blocking apps.
  • Others answer but stay silent or put the phone on mute to waste scammers’ time. Some “play” with scammers for amusement.
  • Several warn that answering may mark a number as “active” and increase spam; others say they already get so much spam it doesn’t matter.
  • Parents and people expecting real callbacks (contractors, doctors, schools) are reluctant to block unknown numbers, citing risk of missing important calls.
  • Voicemail is a common filter, though some note it’s still more work than just answering a legitimate call directly.

Examples of Scams & Social Engineering

  • Apple- and Google-branded phishing attempts, fake medical debt collections, USPS/Royal Mail delivery-fix scams, and Mandarin/Chinese embassy “immigration” threats are frequently reported.
  • A landline scam is described where the attacker never releases the line, then impersonates the victim’s bank when they “call back.”
  • Commenters highlight the complexity of US medical billing as fertile ground for debt-collection scams.
  • Voice cloning and “voice verification” banking are seen as creating new risk: once your voice is captured, it can be reused.

Telecom Infrastructure & Caller ID Spoofing

  • Many see caller-ID spoofing as a root problem; non-technical people often trust caller ID implicitly.
  • Email-style authentication analogies (DMARC/DKIM/SPF) are raised; STIR/SHAKEN and FCC efforts are mentioned, with mixed views on effectiveness and deployment speed.
  • Some note specific countries where spoofing is rare or now regulated, showing that stricter rules and telco enforcement can help.
  • Skepticism persists that carriers genuinely prioritize spam reduction over revenue.

Targets, Crypto vs. Traditional Banking

  • Several note that voice phishers prioritize crypto holders because transfers are fast and irreversible; others point out that traditional banking fraud still dwarfs crypto losses.
  • One takeaway: assume any inbound communication about money is suspect; independently contact institutions using verified channels.

Defensive Practices & Education

  • Core advice: hang up on unsolicited “Apple/Google/bank” calls and initiate contact via official numbers.
  • Some banks now provide in-app indicators confirming whether an ongoing call is genuine.
  • Commenters argue for more public service announcements, especially for older, TV-watching audiences, using real scam scripts to build intuition.